Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure and Efficient RFID Authentication for Social Network in Cloud


Affiliations
1 Noorul Islam University, Tamilnadu, India
2 Noorul Islam University, India
     

   Subscribe/Renew Journal


Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage. The goal of cloud computing is to apply traditional super computing or high performance computing power, normally used by military and research facilities to perform tens of trillions of computations per second, in consumer oriented applications such as social networks, financial portfolios, to deliver personalized information, to provide data storage or to power large immersive computer games. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic Virtual Organizations. It can be used to share/store data and information within a community ranging from low level computation or storage through high level mash-ups such as photo storage. Anonymous authentication is a technique enabling users to prove the privilege without disclosing real identities. Many existing anonymous authentication protocols assume absolute trust to the cloud provider where all private keys are stored. This trust result in serious security and privacy issues in cloud provider. In the proposed work secure and efficient anonymous mutual authentication protocol using Radio Frequency Identification (RFID) technology for cloud services are implemented based on zkp technique. Zero Knowledge Proof (ZKP) is an interactive system where one party wants to prove its identity to a second party using a password but does not want the second party to learn anything about the password. A mandatory access control (MAC) mechanism is to enforce confidentiality and integrity between a large numbers of users by providing a set of standard questions within a group. Finally present experimental results and validate the acceptable performance impact of our deployment on a modern social network.

Keywords

Authentication, RFID, ZKP, Mandatory Access Control.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 229

PDF Views: 2




  • Secure and Efficient RFID Authentication for Social Network in Cloud

Abstract Views: 229  |  PDF Views: 2

Authors

Sherin Jobe
Noorul Islam University, Tamilnadu, India
G. Venifa Mini
Noorul Islam University, Tamilnadu, India
J. Jeya A. Celin
Noorul Islam University, India

Abstract


Cloud computing is one of the fastest growing segments of IT industry since the users commitments for investment and costs are in relation to usage. The goal of cloud computing is to apply traditional super computing or high performance computing power, normally used by military and research facilities to perform tens of trillions of computations per second, in consumer oriented applications such as social networks, financial portfolios, to deliver personalized information, to provide data storage or to power large immersive computer games. Social networks in cloud are used to reflect real world relationships that allow users to share information and form connections between one another, essentially creating dynamic Virtual Organizations. It can be used to share/store data and information within a community ranging from low level computation or storage through high level mash-ups such as photo storage. Anonymous authentication is a technique enabling users to prove the privilege without disclosing real identities. Many existing anonymous authentication protocols assume absolute trust to the cloud provider where all private keys are stored. This trust result in serious security and privacy issues in cloud provider. In the proposed work secure and efficient anonymous mutual authentication protocol using Radio Frequency Identification (RFID) technology for cloud services are implemented based on zkp technique. Zero Knowledge Proof (ZKP) is an interactive system where one party wants to prove its identity to a second party using a password but does not want the second party to learn anything about the password. A mandatory access control (MAC) mechanism is to enforce confidentiality and integrity between a large numbers of users by providing a set of standard questions within a group. Finally present experimental results and validate the acceptable performance impact of our deployment on a modern social network.

Keywords


Authentication, RFID, ZKP, Mandatory Access Control.